Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Mining dero cryptocurrency into a new self-complementary malware infected docker container
Identity

Mining dero cryptocurrency into a new self-complementary malware infected docker container

userBy userMay 27, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 27, 2025Ravi LakshmananCloud Security/Threat Intelligence

Self-spreading docker malware

Misunderstood Docker API instances have become the target of a new malware campaign that converts them to cryptocurrency mining botnets.

The attack, designed to mine for DERO currency, is notable because worm-like features propagate malware to other exposed Docker instances and rope into a growing horde of mining bots.

Kaspersky said it observed that unidentified threat actors gained initial access to running containerized infrastructure by leveraging the unsettled Docker API to weaponize that access and create illegal cryptojacking networks.

“This compromised the running container and created new containers to not only hijack victim resources for cryptocurrency mining, but also launch external attacks that propagate to other networks.”

The attack chain is realized through two components. Nginx is a propagation malware that scans exposed Docker API and “cloud” Dero Cryptocurrency Miner to the Internet. Both payloads are developed using Golang. The use of “nginx” is a deliberate attempt to fly under the radar under the spoof of a legitimate nginx web server.

Cybersecurity

Propagation malware is designed to record malware execution activity, launch miners, enter into an infinite loop, and generate random IPv4 network subnets to flag more sensitive Docker instances that open the default API port 2375 and compromise.

Next, the remote Dockerd daemon for the host with the matching IPv4 will run and check if it is highly responsive. If the “docker -h ps” command fails, “nginx” simply moves from the list to the next IP address.

“After confirming that the remote Dockerd daemon is running and is highly responsive, Nginx generates a container name with 12 random characters and uses it to create a malicious container for the remote target,” explained Wageh. “Nginx prepares a new container for later installation of dependencies by updating the package via “Docker -H exec -Get -YQ update”. ”

The propagation tool then installs Masscan and docker.io in the container so that the malware can interact with the Docker daemon and perform external scans to infect other networks, further spreading the malware. In the final stage, two payloads “nginx” and “cloud” are transferred to the container using the command “docker -h cp -l/usr/bin/:/usr/bin”.

A way to set up persistence is to ensure that the transferred “nginx” binary is added to the “/root/.bash_aliase” file and automatically launches upon shell login. Another important aspect of malware is that it is designed to infect remote, vulnerable hosts with Ubuntu-based running containers.

The ultimate goal of the campaign is to run a Dero Cryptocurrency Miner based on the open source Derohe Cli Miner available on GitHub.

Kaspersky rated it as a duplicate of the Dero mining campaign previously documented by Cloud Strike in March 2023, and the Dero mining campaign targeting Kubernetes clusters based on the wallet and derod node addresses used. Subsequent iterations of the same campaign were flagged by WIZ in June 2024.

Cybersecurity

“The combination of previously known miners and malicious containers and new samples infected with existing containers has compromised the containerized environment,” Wageh said. “The two malicious implants spread without a C2 server, creating networks with containerized infrastructure and not potentially targeting the Docker API to the Internet.”

The development is that Ahnlab Security Intelligence Center (ASEC) details a campaign that includes the deployment of Monero Coin Miner, along with an unprecedented backdoor using the PybitMessage Peer-to-Peer (P2P) communications protocol, which processes incoming instructions using the Pybitmessage Peer-to-Peer (P2P) communications protocol and runs as a PowerShell script.

The exact distribution method used in the campaign is currently unknown, but it is essential that users avoid downloading files from unknown or unreliable sources and stick to legitimate distribution channels, as they are suspected of being disguised as a cracked version of popular software.

“The Bitmessage protocol is a messaging system designed with anonymity and decentralization in mind, featuring prevention of interception by intermediaries and anonymization of message senders and receivers,” ASEC said.

“Threat Actors utilized the PybitMessage module that implements this protocol in a Python environment, exchanging encrypted packets in a similar format to normal web traffic. In particular, C2 commands and control messages are hidden within messages from real users of the BitMessage network.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSalesforce acquires Informatica for $8 billion
Next Article Report: Tusimple sent sensitive autonomous driving data to China after US national security agreement
user
  • Website

Related Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Wikipedia says AI search summaries and social videos are causing traffic decline

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.